Privilege Escalation Vulnerabilties

Learn to identify and prevent privilege escalation vulnerabilities in ABAP®

Like with all programming languages, ABAP® based applications can contain security flaws. Because of different programming paradigms, frameworks, and runtimes for ABAP®, the exploitability of a flaw and security code measures can vary. You'll learn to identify code flaws due to missing or erroneous control flow that can allow privilege escalation and what threats they can pose to the SAP system.

Completing this E-Learning course:

  • You know common strategies to determine the risk of privelege escalation vulnerabilities in ABAP® applications and approaches to identify them
  • You can assess the risk of ABAP® applications for privelege escalation vulnerabilities

General Information

  • Each e-learning lasts 1 hour and costs one Kujambel Credit (or 100 Euro plus VAT)
  • all e-learnings are available regardless of the time of day and location
  • all e-learnings are available in the English language

Technical Requirements

Access

  • Participants have an HTML5 capable browser (Chrome, Firefox, Edge) on their desktop operating system
  • The firewall of the computer or network firewall does not block outgoing connections to NO MONKEY domains

Infrastructure

  • The computer has at least downstream bandwidth of at least 3 MBit/s and upstream of 1 MBit/s

Please consider here further and more detailed requirements for access and infrastructure.

Marco HammelCo-Founder and CTO, NO MONKEY
  • More than eight years in educating, advising, and securing people, processes, and SAP technology
  • With his experience as a software developer, the topic of code and software pipeline security is his main focus
  • CISSP certified cybersecurity expert with an SAP technology background
Fundamentals of Securing ABAP® Based Business Applications

We'll let you know when this course is ready

Please note that this e-learning module is currently in production and will be available soon.

If you'd like to be notified when this course goes live, please use the contact form below.

Reach Out to NO MONKEY